This paper offers a new approach to modelling the effect of cyber-attacks on reliability of software used in industrial control applications. The model is based on the view that successful cyber-attacks introduce failure regions, which are not present in non-compromised software. The model is then extended to cover a fault tolerant architecture, such as the 1-out-of-2 software, popular for building industrial protection systems. The model is used to study the effectiveness of software maintenance policies such as patching and "cleansing" ("proactive recovery") under different adversary models ranging from independent attacks to sophisticated synchronized attacks on the channels. We demonstrate that the effect of attacks on reliability of di...
To evaluate security in the context of software reliability engineering, it is necessary to analyse ...
Abstract This paper considers the estimation of re-liability and availability of intrusion-tolerant ...
Software vulnerability life cycles illustrate changes in detection processes of software vulnerabili...
This software takes a particular view on modelling the effects of cyber-attacks on reliability of co...
In this paper we report recent results on modelling the impact of cy-ber-attacks on the resilience o...
In this paper we report on a recent study of the impact of cyber-attacks on the resilience of comple...
The typical cyber attacker is assumed to be all powerful and to exploit allpossible vulnerabilities....
A computer system's security can be compromised in many ways—a denial-of-service attack can make a s...
The assumption that a cyberattacker will potentially exploit all present vulnerabilities drives most...
A computer system's security can be compromised in many ways a denial-of-service attack can make a s...
Attackers can tamper with programs to break usage conditions. Different software protection techniqu...
\u3cp\u3eIn this paper we present and validate a novel attacker model based on the economic notion t...
Software vulnerabilities (i.e. programming errors that could be exploited by online offenders) are c...
This chapter reports on a model-based approach to assessing cyber-risks in a cyber-physical system (...
In this paper we present and validate a novel attacker model based on the economic notion that the a...
To evaluate security in the context of software reliability engineering, it is necessary to analyse ...
Abstract This paper considers the estimation of re-liability and availability of intrusion-tolerant ...
Software vulnerability life cycles illustrate changes in detection processes of software vulnerabili...
This software takes a particular view on modelling the effects of cyber-attacks on reliability of co...
In this paper we report recent results on modelling the impact of cy-ber-attacks on the resilience o...
In this paper we report on a recent study of the impact of cyber-attacks on the resilience of comple...
The typical cyber attacker is assumed to be all powerful and to exploit allpossible vulnerabilities....
A computer system's security can be compromised in many ways—a denial-of-service attack can make a s...
The assumption that a cyberattacker will potentially exploit all present vulnerabilities drives most...
A computer system's security can be compromised in many ways a denial-of-service attack can make a s...
Attackers can tamper with programs to break usage conditions. Different software protection techniqu...
\u3cp\u3eIn this paper we present and validate a novel attacker model based on the economic notion t...
Software vulnerabilities (i.e. programming errors that could be exploited by online offenders) are c...
This chapter reports on a model-based approach to assessing cyber-risks in a cyber-physical system (...
In this paper we present and validate a novel attacker model based on the economic notion that the a...
To evaluate security in the context of software reliability engineering, it is necessary to analyse ...
Abstract This paper considers the estimation of re-liability and availability of intrusion-tolerant ...
Software vulnerability life cycles illustrate changes in detection processes of software vulnerabili...